Contact:
Human Resources
Office: (417) 873-7434
Toll Free: 1 (800) 922-2274
Fax: (417) 873-7529
hr@drury.edu

Policy and Ethics Statement for Use of Computer Resources

Statement of User Responsibility

  • The use of all computer accounts and resources is the personal responsibility of each account holder. Use of Academic Computing resources must be consistent with institutional policies governing how we conduct ourselves as members of the community including policies regarding cheating, plagiarism, harassment and theft. Other campus policies are not altered by the use of computer resources and shall apply to all misuse of the resources. It is the computer user's responsibility to comply with all general campus, as well as computing, policies.
  • Academic Computing services and resources are made available to support the academic programs and activities of Drury University. Use of those services and resources is a privilege that is not to be abused and can be taken away without prior consent or when required by law or when there is a substantiated reason to believe that violations of law or policy have occurred. In time-sensitive cases, access may be restricted to meet critical operational needs. Any inappropriate, illegal, unethical or immoral use constitutes a violation of this policy whether or not it is specifically identified below. Any activity intended to damage Academic Computing resources or any individual is a violation of the policy.
  • Each computer user is responsible for the storage of personal files created on Drury computing facilities. Hard disks will be routinely cleared of files. Under no circumstances will Drury University be held responsible for any files stored on or deleted from its hard disks.
  • Each computer user is responsible for taking reasonable care for the security of his/her campus account and password. For example, one should change his/her password frequently; one should not under any circumstances give his/her password to another person. Examples of Appropriate Uses of Computer Resources Include:
    • Faculty research;
    • Student research;
    • Class assignments;
    • Instructional use in classes
Examples of Inappropriate Uses of Computer Resources Include:
  • It is a violation of university policy to use computer resources for any purpose unrelated to the mission of the university.
  • It is a violation of university policy to use computer facilities for cheating. This includes unauthorized copying, installation, sending or receiving of programs, assignments or files.
  • It is a violation of university policy to send unsolicited annoying or obscene messages or mail to another computer or computer user.
  • It is a violation of university policy to utilize a false identity in obtaining or utilizing an email account.
  • It is a violation of university policy to display adult web sites (specifically those self-identified as such) or other obscene materials in public labs in view of other users. Such conduct is considered sexual harassment, i.e., an action "that has the purpose or effect of unreasonably interfering with an individual's academic or work performance, or creating an intimidating, hostile, or offensive academic or work environment" (from the university's Sexual Harassment Policy Statement)
  • It is a violation of university policy to examine, or attempt to examine, another computer user's files or mail, without explicit permission by the owner of those files or mail.
  • It is a violation of university policy to interrupt, hinder, or otherwise interfere with the normal operation of the computer labs and network.
  • It is a violation of university policy to post copyrighted text or images on a web page without the owner's permission.
  • Fraudulent use of computer accounts, networks, mail services or other resources is a criminal offense. Missouri state law (RSMo 569.093-569.099) makes unauthorized access and interference with computer systems, computer data and other computer users illegal.
Privacy Issues and Access to Files on the Campus Servers

  • The university and its staff shall treat all electronically stored information as confidential, but may examine or disclose information when authorized by the owner of the information, when approved by appropriate Vice-president, or required by local, state or federal law including, but not limited to, laws regarding harassment, libel and defamation of character.
  • Electronic Mail (E-mail)
    The E-mail system at Drury is here to provide a convenient (not necessarily confidential) way of communicating between students and faculty, between colleagues and between friends. It is expected that Drury computer users will use common courtesy in the use of E-mail.
    1. Examples of inappropriate use include:
      • Re-posting (forwarding) personal communication, intended to be confidential, without the author's prior consent.
      • "Chain letters," "broadcasting" messages to lists or individuals, and other types of use which would cause congestion of the networks or otherwise interfere with the work of others are not allowed.
      • Anonymous and/or fraudulent posting of email messages
    2. Privacy
      • Electronic mail (e-mail) is a form of public communication and cannot be guaranteed to be private. Messages can be intercepted while in transit through the system. Be discreet.
      • Issues of personal privacy and data confidentiality are very important to the university. Personal data will only be accessed in accordance with part IV. Section A.
      • The systems and network administrators do have access to all files stored on the university servers. In the course of routine system maintenance, troubleshoot ing and mail delivery problem resolution, staff may inadvertently see the content of email messages. However, these individuals are prohibited from accessing personal files except as otherwise stated in part IV. Section A.
    Intellectual Property
    All communications and information accessible via the Internet should be assumed to be copyrighted and should be accessed and redistributed using regular copyright rules. When sources found on the Internet are cited, the name, date and location of the information must be included. Compliance Procedure:
    • Inappropriate uses of computer resources should be reported to the Director of Academic Computing or the Director of Computer Services.